DocumentCode :
804022
Title :
Securing resource-constrained wireless ad hoc networks
Author :
Fang, Yuguang ; Zhu, Xiaoyan ; Zhang, Yanchao
Author_Institution :
Univ. of Florida, Gainesville, FL
Volume :
16
Issue :
2
fYear :
2009
fDate :
4/1/2009 12:00:00 AM
Firstpage :
24
Lastpage :
30
Abstract :
Huge interest in and demand for services over the information superhighway have pressed various telecommunications research fronts and led to a new form of future Internet consisting of wired and wireless segments where resource-constrained devices such as mobile devices, smart phones, palm pilots, and wireless sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous networks, particularly over wireless networks with resource constraints. In this tutorial article we discuss a novel approach to addressing security issues, and articulate why and how ID-based cryptography can be effectively applied to address various security problems in resource-constrained wireless networks.
Keywords :
Internet; ad hoc networks; cryptography; mobile radio; ID- based cryptography; Internet; heterogeneous networks; information superhighway; mobile devices; palm pilots; resource-constrained devices; resource-constrained wireless ad hoc networks; security; smart phones; wireless sensors; Authentication; Communication system security; Computer network management; Computer networks; Digital signatures; Identity-based encryption; Mobile ad hoc networks; Public key; Public key cryptography; Wireless sensor networks;
fLanguage :
English
Journal_Title :
Wireless Communications, IEEE
Publisher :
ieee
ISSN :
1536-1284
Type :
jour
DOI :
10.1109/MWC.2009.4907556
Filename :
4907556
Link To Document :
بازگشت